Wembley PartnersAug 12, 20215 min readAutomated Cyber Weapons: The Cobalt Strike Bug, And The Dangers of AutomationWhat if sophisticated Penetration Testing and cyber defence tools can be turned against us? A Cobalt Strike bug shows it's possible.
Wembley PartnersJul 15, 20216 min readAn Inside Look Into Black Hats, Motives, and Cybercrime: Ideologies Explained Is the world as black and white as the proverbial "hats" that hackers wear? We explore the topic with the hacktivist group, GhostSec.
Wembley PartnersMay 28, 20215 min readWhat are the Use Cases for Cyber Threat Intelligence?We've discussed Cyber Threat Intelligence in depth this May. Now, let's talk about specific areas where CTI makes a meaningful difference.
Wembley PartnersApr 29, 20214 min readSo, We Have A Cyber Incident Response Program. What’s Next?While having a decent Cyber Incident Response Program is absolutely essential, it's not a panacea. How can you boost its effectiveness?
Wembley PartnersApr 22, 20213 min readComponents of a World-Class Cyber Incident Response ProgramYou've heard the term. But what does a truly world-class Cyber Incident Response program look like?
Wembley PartnersApr 15, 20215 min readWhose Job is it to Respond to Cyber Incidents Anyway?It is a common misconception to perceive cyber defense as a purely technical matter. The reality is, cybersecurity is a holistic function.
Wembley PartnersApr 8, 20214 min readWhat Is a Cyber Incident Response Program and Do I REALLY Need One?You’re preparing to leave the office on a cool Tuesday afternoon when your desk phone beeps. It’s your IT guy, and it isn't good news.
Wembley PartnersApr 6, 20215 min readThe Facebook Breach: Everything You Need To KnowWhile families spent the weekend unwrapping their Easter chocolate, cybercriminals were unwrapping a treat of an entirely different nature.